Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network I...Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network IDS, which is helpful to design an effective IDS. Besides, this paper suggests a scheme to represent the self profile of network. And an automated self profile extraction algorithm is provided to extract self profile from packets. The experimental results prove validity of the scheme and algorithm, which is the foundation of the immune model.展开更多
In this work, the extractive distillation with heat integration process is extended to separate the pressure-insensitive benzene-cyclohexane azeotrope by using furfural as the entrainer. The optimal design of extracti...In this work, the extractive distillation with heat integration process is extended to separate the pressure-insensitive benzene-cyclohexane azeotrope by using furfural as the entrainer. The optimal design of extractive distillation process is established to achieve minimum energy requirement using the multi-objective genetic algorithm, and the results show that energy saving for this heat integration process is 15.7%. Finally, the control design is performed to investigate the system's dynamic performance, and three control structures are studied. The pressure-compensated temperature control scheme is proposed based on the first two control structures, and the dynamic responses reveal that the feed disturbances in both flow rate and benzene composition can be mitigated well.展开更多
Generalized morphological operator can generate less statistical bias in the output than classical morphological operator. Comprehensive utilization of spectral and spatial information of pixels, an endmember extracti...Generalized morphological operator can generate less statistical bias in the output than classical morphological operator. Comprehensive utilization of spectral and spatial information of pixels, an endmember extraction algorithm based on generalized morphology is proposed. For the limitations of morphological operator in the pixel arrangement rule and replacement criteria, the reference pixel is introduced. In order to avoid the cross substitution phenomenon at the boundary of different object categories in the image, an endmember is extracted by calculating the generalized opening-closing(GOC) operator which uses the modified energy function as a distance measure. The algorithm is verified by using simulated data and real data. Experimental results show that the proposed algorithm can extract endmember automatically without prior knowledge and achieve relatively high extraction accuracy.展开更多
In this paper, a new method, named as L-tree match, is presented for extracting data from complex data sources. Firstly, based on data extraction logic presented in this work, a new data extraction model is constructe...In this paper, a new method, named as L-tree match, is presented for extracting data from complex data sources. Firstly, based on data extraction logic presented in this work, a new data extraction model is constructed in which model components are structurally correlated via a generalized template. Secondly, a database-populating mechanism is built, along with some object-manipulating operations needed for flexible database design, to support data extraction from huge text stream. Thirdly, top-down and bottom-up strategies are combined to design a new extraction algorithm that can extract data from data sources with optional, unordered, nested, and/or noisy components. Lastly, this method is applied to extract accurate data from biological documents amounting to 100GB for the first online integrated biological data warehouse of China.展开更多
Phishing is a technique under Social Engineering attacks which is most widely used to get user sensitive information,such as login credentials and credit and debit card information,etc.It is carried out by a person ma...Phishing is a technique under Social Engineering attacks which is most widely used to get user sensitive information,such as login credentials and credit and debit card information,etc.It is carried out by a person masquerading as an authentic individual.To protect web users from these attacks,various anti-phishing techniques are developed,but they fail to protect the user from these attacks in various ways.In this paper,we propose a novel technique to identify phishing websites effortlessly on the client side by proposing a novel browser architecture.In this system,we use the rule of extraction framework to extract the properties or features of a website using the URL only.This list consists of 30 different properties of a URL,which will later be used by the Random Forest Classification machine learning model to detect the authenticity of the website.A dataset consisting of 11,055 tuples is used to train the model.These processes are carried out on the client-side with the help of a redesigned browser architecture.Today Researches have come up with machine learning frameworks to detect phishing sites,but they are not in a state to be used by individuals having no technical knowledge.To make sure that these tools are accessible to every individual,we have improvised and introduced detection methods into the browser architecture named as‘Embedded Phishing Detection Browser’(EPDB),which is a novel method to preserve the existing user experience while improving the security.The newly designed browser architecture introduces a special segment to perform phishing detection operations in real-time.We have prototyped this technique to ensure maximum security,better accuracy of 99.36%in the identification of phishing websites in realtime.展开更多
Phishing is a technique under Social Engineering attacks which is most widely used to get user sensitive information,such as login credentials and credit and debit card information,etc.It is carried out by a person ma...Phishing is a technique under Social Engineering attacks which is most widely used to get user sensitive information,such as login credentials and credit and debit card information,etc.It is carried out by a person masquerading as an authentic individual.To protect web users from these attacks,various anti-phishing techniques are developed,but they fail to protect the user from these attacks in various ways.In this paper,we propose a novel technique to identify phishing websites effortlessly on the client side by proposing a novel browser architecture.In this system,we use the rule of extraction framework to extract the properties or features of a website using the URL only.This list consists of 30 different properties of a URL,which will later be used by the Random Forest Classification machine learning model to detect the authenticity of the website.A dataset consisting of 11,055 tuples is used to train the model.These processes are carried out on the client-side with the help of a redesigned browser architecture.Today Researches have come up with machine learning frameworks to detect phishing sites,but they are not in a state to be used by individuals having no technical knowledge.To make sure that these tools are accessible to every individual,we have improvised and introduced detection methods into the browser architecture named as‘Embedded Phishing Detection Browser’(EPDB),which is a novel method to preserve the existing user experience while improving the security.The newly designed browser architecture introduces a special segment to perform phishing detection operations in real-time.We have prototyped this technique to ensure maximum security,better accuracy of 99.36% in the identification of phishing websites in realtime.展开更多
A stall diagnosis method based on the entropy feature extraction algorithm is developed in axial compressors.The reliability of the proposed method is determined and a parametric sensitivity analysis is experimentally...A stall diagnosis method based on the entropy feature extraction algorithm is developed in axial compressors.The reliability of the proposed method is determined and a parametric sensitivity analysis is experimentally conducted for two different types of compressor stall diagnoses.A collection of time‐resolved pressure sensors is mounted circumferentially and along the chord direction to measure the dynamic pressure on the casing.Results show that the stall and prestall precursor embedded in the dynamic pressures are identified through nonlinear feature perturbation extraction using the entropy feature extraction algorithm.Further analysis demonstrates that the prestall precursor with the peak entropy value is related to the unsteady tip leakage flow for the spike‐type stall diagnosis.The modal wave inception with increasing amplitude is identified by the considerable increase of the entropy value.The flow field in the tip region indicates that the modal wave corresponds to the flow separation in the suction side of the rotor blade.The warning time is 100–300 rotor revolutions for both types of stall diagnoses,which is beneficial for stall control in different axial compressors.Moreover,a parametric study of the embedding dimension m,similar tolerance n,similar radius r,and data length N in the fuzzy entropy method is conducted to determine the optimal parameter setting for stall diagnosis.The stall warning based on the entropy feature extraction algorithm provides a new stall diagnosis approach in the axial compressor with different stall types.This stall warning can also be adopted as an online stability monitoring index when using the concept of active stall control.展开更多
To improve the analysis methods for the measurement of the sediment particle sizes with a wide distribution and of irregular shapes, a sediment particle image measurement, an analysis system, and an extraction algorit...To improve the analysis methods for the measurement of the sediment particle sizes with a wide distribution and of irregular shapes, a sediment particle image measurement, an analysis system, and an extraction algorithm of the optimal threshold based on the gray histogram peak values are proposed. Recording the pixels of the sediment particles by labeling them, the algorithm can effectively separate the sediment particle images from the background images using the equivalent pixel circles with the same diameters to represent the sediment particles. Compared with the laser analyzer for the case of blue plastic sands, the measurement results of the system are shown to be reasonably similar. The errors are mainly due to the small size of the particles and the limitation of the apparatus. The measurement accuracy can be improved by increasing the Charge-Coupled Devices (CCD) camera resolution. The analysis method of the sediment particle images can provide a technical support for the rapid measurement of the sediment particle size and its distribution.展开更多
基金the National Natural Science Foundation of China(69983005)and the Research Fund for the Doctoral Program of Higher Education(RFDP1999048602)
文摘Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network IDS, which is helpful to design an effective IDS. Besides, this paper suggests a scheme to represent the self profile of network. And an automated self profile extraction algorithm is provided to extract self profile from packets. The experimental results prove validity of the scheme and algorithm, which is the foundation of the immune model.
基金supported by the National Natural Science Foundation of China(grant number 21476261)the Key Research and Development Plan Project of Shandong Province(grant number 2015GGX107004)
文摘In this work, the extractive distillation with heat integration process is extended to separate the pressure-insensitive benzene-cyclohexane azeotrope by using furfural as the entrainer. The optimal design of extractive distillation process is established to achieve minimum energy requirement using the multi-objective genetic algorithm, and the results show that energy saving for this heat integration process is 15.7%. Finally, the control design is performed to investigate the system's dynamic performance, and three control structures are studied. The pressure-compensated temperature control scheme is proposed based on the first two control structures, and the dynamic responses reveal that the feed disturbances in both flow rate and benzene composition can be mitigated well.
基金supported by the National Natural Science Foundation of China(No.61275010)the PhD Programs Foundation of Ministry of Education of China(No.20132304110007)
文摘Generalized morphological operator can generate less statistical bias in the output than classical morphological operator. Comprehensive utilization of spectral and spatial information of pixels, an endmember extraction algorithm based on generalized morphology is proposed. For the limitations of morphological operator in the pixel arrangement rule and replacement criteria, the reference pixel is introduced. In order to avoid the cross substitution phenomenon at the boundary of different object categories in the image, an endmember is extracted by calculating the generalized opening-closing(GOC) operator which uses the modified energy function as a distance measure. The algorithm is verified by using simulated data and real data. Experimental results show that the proposed algorithm can extract endmember automatically without prior knowledge and achieve relatively high extraction accuracy.
文摘In this paper, a new method, named as L-tree match, is presented for extracting data from complex data sources. Firstly, based on data extraction logic presented in this work, a new data extraction model is constructed in which model components are structurally correlated via a generalized template. Secondly, a database-populating mechanism is built, along with some object-manipulating operations needed for flexible database design, to support data extraction from huge text stream. Thirdly, top-down and bottom-up strategies are combined to design a new extraction algorithm that can extract data from data sources with optional, unordered, nested, and/or noisy components. Lastly, this method is applied to extract accurate data from biological documents amounting to 100GB for the first online integrated biological data warehouse of China.
文摘Phishing is a technique under Social Engineering attacks which is most widely used to get user sensitive information,such as login credentials and credit and debit card information,etc.It is carried out by a person masquerading as an authentic individual.To protect web users from these attacks,various anti-phishing techniques are developed,but they fail to protect the user from these attacks in various ways.In this paper,we propose a novel technique to identify phishing websites effortlessly on the client side by proposing a novel browser architecture.In this system,we use the rule of extraction framework to extract the properties or features of a website using the URL only.This list consists of 30 different properties of a URL,which will later be used by the Random Forest Classification machine learning model to detect the authenticity of the website.A dataset consisting of 11,055 tuples is used to train the model.These processes are carried out on the client-side with the help of a redesigned browser architecture.Today Researches have come up with machine learning frameworks to detect phishing sites,but they are not in a state to be used by individuals having no technical knowledge.To make sure that these tools are accessible to every individual,we have improvised and introduced detection methods into the browser architecture named as‘Embedded Phishing Detection Browser’(EPDB),which is a novel method to preserve the existing user experience while improving the security.The newly designed browser architecture introduces a special segment to perform phishing detection operations in real-time.We have prototyped this technique to ensure maximum security,better accuracy of 99.36%in the identification of phishing websites in realtime.
文摘Phishing is a technique under Social Engineering attacks which is most widely used to get user sensitive information,such as login credentials and credit and debit card information,etc.It is carried out by a person masquerading as an authentic individual.To protect web users from these attacks,various anti-phishing techniques are developed,but they fail to protect the user from these attacks in various ways.In this paper,we propose a novel technique to identify phishing websites effortlessly on the client side by proposing a novel browser architecture.In this system,we use the rule of extraction framework to extract the properties or features of a website using the URL only.This list consists of 30 different properties of a URL,which will later be used by the Random Forest Classification machine learning model to detect the authenticity of the website.A dataset consisting of 11,055 tuples is used to train the model.These processes are carried out on the client-side with the help of a redesigned browser architecture.Today Researches have come up with machine learning frameworks to detect phishing sites,but they are not in a state to be used by individuals having no technical knowledge.To make sure that these tools are accessible to every individual,we have improvised and introduced detection methods into the browser architecture named as‘Embedded Phishing Detection Browser’(EPDB),which is a novel method to preserve the existing user experience while improving the security.The newly designed browser architecture introduces a special segment to perform phishing detection operations in real-time.We have prototyped this technique to ensure maximum security,better accuracy of 99.36% in the identification of phishing websites in realtime.
基金National Natural Science Foundation of China,Grant/Award Number:51922098,51727810National Science and TechnologyMajor Project of China,Grant/Award Number:J2019‐II‐0020‐0041Special Fund for the Member of Youth Innovation Promotion Association of Chinese Academy of Sciences,Grant/Award Number:2018173。
文摘A stall diagnosis method based on the entropy feature extraction algorithm is developed in axial compressors.The reliability of the proposed method is determined and a parametric sensitivity analysis is experimentally conducted for two different types of compressor stall diagnoses.A collection of time‐resolved pressure sensors is mounted circumferentially and along the chord direction to measure the dynamic pressure on the casing.Results show that the stall and prestall precursor embedded in the dynamic pressures are identified through nonlinear feature perturbation extraction using the entropy feature extraction algorithm.Further analysis demonstrates that the prestall precursor with the peak entropy value is related to the unsteady tip leakage flow for the spike‐type stall diagnosis.The modal wave inception with increasing amplitude is identified by the considerable increase of the entropy value.The flow field in the tip region indicates that the modal wave corresponds to the flow separation in the suction side of the rotor blade.The warning time is 100–300 rotor revolutions for both types of stall diagnoses,which is beneficial for stall control in different axial compressors.Moreover,a parametric study of the embedding dimension m,similar tolerance n,similar radius r,and data length N in the fuzzy entropy method is conducted to determine the optimal parameter setting for stall diagnosis.The stall warning based on the entropy feature extraction algorithm provides a new stall diagnosis approach in the axial compressor with different stall types.This stall warning can also be adopted as an online stability monitoring index when using the concept of active stall control.
基金supported by the National Key Basic Research and Development of China(973Program,Grant No.2011CB403303)the China National Funds for Distinguished Young Scientists(Grant No.51125034)the National Natural Science Foundation of China(Grant Nos.50909036,50879019)
文摘To improve the analysis methods for the measurement of the sediment particle sizes with a wide distribution and of irregular shapes, a sediment particle image measurement, an analysis system, and an extraction algorithm of the optimal threshold based on the gray histogram peak values are proposed. Recording the pixels of the sediment particles by labeling them, the algorithm can effectively separate the sediment particle images from the background images using the equivalent pixel circles with the same diameters to represent the sediment particles. Compared with the laser analyzer for the case of blue plastic sands, the measurement results of the system are shown to be reasonably similar. The errors are mainly due to the small size of the particles and the limitation of the apparatus. The measurement accuracy can be improved by increasing the Charge-Coupled Devices (CCD) camera resolution. The analysis method of the sediment particle images can provide a technical support for the rapid measurement of the sediment particle size and its distribution.